Custom JPEG Quantization for Improved Iris Recognition Accuracy

Size: px
Start display at page:

Download "Custom JPEG Quantization for Improved Iris Recognition Accuracy"

Transcription

1 Custom JPEG Quantization for Improved Iris Recognition Accuracy Gerald Stefan Kostmajer 1,HerbertStögner 1, and Andreas Uhl 2 1 School of Communication Engineering for IT, Carinthia Tech Institute, Austria 2 Department of Computer Sciences, University of Salzburg, Austria uhl@cosy.sbg.ac.at Abstract. Custom JPEG quantization matrices are proposed to be used in the context of compression within iris recognition. Superior matching results in terms of average Hamming distance and improved ROC is found as compared to the use of the default quantization table especially for low FAR. This leads to improved user convenience in case high security is required. 1 Introduction With the increasing usage of biometric systems the question arises naturally how to store and handle the acquired sensor data. In this context, the compression of these data may become imperative under certain circumstances due to the large amounts of data involved. Among other possibilities (e.g. like template storage on IC cards), compression technology may be used in two stages of the processing chain in classical biometric recognition: 1. Transmission of sample data after sensor data acquisition: In distributed biometric systems, the data acquisition stage is often dislocated from the feature extraction and matching stage (this is true for the enrollment phase as well as for authentication). In such environments the sensor data have to be transferred via a network link to the respective location, often over wireless channels with low bandwidth and high latency. Therefore, a minimization of the amount of data to be transferred is highly desirable, which is achieved by compressing the data before transmission. An alternative solution would be to extract the features before transmission and to transfer feature data only in many cases, feature extraction is more demanding as compared to compression which generates additional workload for the often mobile and low power acquisition devices. 2. Storage of reference data: In most template databases (where the reference data of the enrolled individuals is stored) only the extracted features required for the matching step are stored as opposed to retaining the originally acquired sensor data. However, in case the features should be replaced for some reason (e.g. when a superior or license-free matching technique involving a different feature set becomes available), having stored only extracted features implies the requirement for all legitimate users for a re-enrollment, which can be expensive and is highly undesired since user-acceptance of the entire biometric system will suffer. Storing the original D. Gritzalis and J. Lopez (Eds.): SEC 2009, IFIP Series 297, pp , c IFIP International Federation for Information Processing 2009

2 Custom JPEG Quantization for Improved Iris Recognition Accuracy 77 sensor data in addition to the features required for the current matching technique solves this problem. Of course, these data need to be stored in compressed (to save storage space) and encrypted (to protect privacy) form. Having found that compression of the raw sensor data can be advantageous in certain applications, we have to identify techniques suited to accomplish this task in an optimal manner. In order to maximize the benefit in terms of data reduction, lossy compression techniques have to be applied. However, the distortions introduced by compression artifacts usually interfere with subsequent feature extraction and may degrade the matching results. In particular, FRR or FNMR will increase (since features of the data of legitimate users are extracted less accurately from compressed data) which in turn affects user convenience and general acceptance of the biometric system. In extreme cases, even FAR or FMR might be affected. In this work, we will focus on the lossy compression of iris images using the JPEG standard. We discuss the use of custom quantization matrices in order to reflect the specific properties of iris imagery. Contrasting to the overwhelming majority of literature and studies in the field of compressing biometric sample data, we will not rely on assessing the resulting objective and subjective image quality after compression, but we will apply a biometric iris recognition systems to the compressed sensor data to evaluate the effects of compression on recognition accuracy, in particular on the matching results of legitimate and illegitimate users. In Section 2, we will review and discuss the available literature on biometric sample data compression with focus on iris data storage. Section 3 is the main part of this work where we discuss properties of iris imagery and present several variants of custom JPEG quantization matrices (designed in order to hopefully improve recognition accuracy). In section 4 we first describe the employed iris recognition system and the data this algorithm are applied to. Subsequently we discuss our experimental results with respect to the observed improvements of recognition accuracy. 2 Iris Image Compression Iris recognition is claimed to be the most secure biometric modality exhibiting practically 0% FAR and low FRR. An interesting fact is that the iris recognition market is strongly dominated by Iridian Inc. based technology which is based on algorithms of J. Daugman [2]. The certainly most relevant standard for compressing iris image data is the recent ISO/IEC standard on Biometric Data Interchange Formats. While the data formats specified by the ISO/IEC standard are fixed at present state, their customized use tailored to a specific target modality and the corresponding impact on recognition accuracy as compared to the default settings has not been investigated. This is the scope of the current paper. ISO/IEC allows iris image data to be stored in lossy manner in the JPEG and JPEG2000 formats. Two types of iris image data are considered: rectilinear images (i.e. images of the entire eye) and polar images (which are basically the result of iris detection and segmentation), the latter much smaller in terms of storage requirement (e.g. 2kB vs kB for rectilinear images). It is important to note that with this standardization it

3 78 G.S. Kostmajer, H. Stögner, and A. Uhl might become more attractive for companies to investigate alternatives to Iridian products due to the available common data format iris recognition systems can rely on. Only recently, first results and techniques are available on iris image compression and its impact on recognition performance. Ives et al. [5,6] apply JPEG2000 up to a compression rate of 20 to rectilinear image data (the CASIA database and a proprietary image collection is used) and investigates the effects on FAR and FRR of a 1-D version of the Daugman algorithm (the same system which is used in this study). Rakshit and Monro [11] again use JPEG2000 to compress polar iris images up to a compression rate of 80 and studies the impact on verification accuracy of three iris recognition systems (including the Daugman algorithm, the CASIA database is used). Daugman and Downing [3] apply JPEG and JPEG2000 to rectilinear image data (the NIST ICE database is used) and remove image background (i.e. parts of the image not being part of the eye like eye-lids are replaced by constant average gray) before compression is applied. A more compact way of representing the Daugman IrisCode is discussed in [12], however, these results refer to template compression and are only valid for the techniques related to Iridian products. In previous work [9,7], we have compared five general purpose compression algorithms (including JPEG and JPEG2000) with respect to their impact on iris recognition accuracy of three different recognition schemes (the CASIA database has been used). In accordance to [3] superior compression performance of JPEG2000 over JPEG is found especially for low bitrates, however, for high and medium quality JPEG is still an option to consider. So far, compression algorithms have been applied to iris imagery with their respective standard settings. In the subsequent study we apply JPEG as covered by ISO/IEC to rectilinear iris images and propose to use custom quantization matrices adapted to properties of iris imagery. Contrasting to the optimization of the JPEG quantization matrix with respect to human perception as done for the development of the standard matrix, rate/distortion criteria have also been used successfully for the design of this matrix (see e.g. [4]). In [1] compression algorithms tuned for application in the pattern recognition context are proposed, which are based on the modification of the standard compression algorithms: this is done by emphasizing middle and high frequencies and discarding low frequencies (the standard JPEG quantization matrix is rotated by 180 degrees). JPEG quantization matrix optimization has already been considered in biometrics [8] employ a rate/distortion criterion in the context of face recognition and achieve superior recognition performance as compared to the standard matrix. 3 Custom JPEG Quantization The JPEG still image compression standard [10] allows to use custom quantization tables (Q-tables) in case image material with special properties is subject to compression. These tables are signalled in the header information. The default quantization matrices have been designed with respect to psychovisual optimality employing large scale experimentation involving a high number of test subjects. There are two reasons which suggest to use different Q-tables as the default configuration: First, iris imagery might have different properties as compared to common arbitrary images, and second, a pleasant viewing experience as being the aim in designing the default tables, might

4 Custom JPEG Quantization for Improved Iris Recognition Accuracy 79 not deliver optimal matching results in the context of biometric recognition (e.g. sharp edges required for exact matching could appear appealing to human observers). Therefore, as a first stage, we have investigated iris imagery in more detail. 8x8 pixel blocks have been subjected to DCT transform and the resulting coefficients are averaged for a large number of blocks (i.e. 2000, 525, and blocks for the three types of imagery, respectively). As a first class of blocks, we have used arbitrary images and blocks are extracted randomly. The second class of blocks is extracted iris texture taken left and right of the pupil while the third class is taken from polar iris images generated by the employed matching algorithm (see below). Fig. 1 displays the result of all three classes where the DC and the largest AC coefficient are set to white, zero is set to black and the remaining values are scaled in between (note that the logarithm is applied to the magnitude of all coefficients before this scaling operation). (a) arbitraryblocks (b) polar iris blocks (c) horizontal iris blocks Fig. 1. Averaged 8x8 DCT blocks The arbitrary blocks (Fig. 1.a) show the typical expected behaviour with decreasing coefficient magnitude for increasing frequency and symmetry with respect to the coordinate axes. Fig. 1.b reveals that in polar iris images there is more energy in the higher frequencies in horizontal direction as compared to vertical direction. This is to be expected since luminance fluctuations in iris texture are more pronounced in radial direction as compared to perpendicular direction. Finally, Fig. 1.c confirms this expectation showing more energy in the higher frequencies in vertical direction. While we cannot exploit the direction bias of iris texture in compression since we are dealing with rectangular iris images, we conjecture that the highest and medium (a) Q-table 12 (b) Q-table 13 (c) Q-table 15 (d) Q-table 16 Fig. 2. JPEG Quantization tables

5 80 G.S. Kostmajer, H. Stögner, and A. Uhl frequencies might not be required for he matching stage due to the coarse quantization used for template generation while at least medium frequencies are required for pleasant viewing. Fig. 2 displays the Q-tables used in our experiments. From left to right, an increasing amount of high frequencies is suppressed following the zig-zag scan known from JPEG bitstream generation (by dividing the coefficients by 255), coefficients not affected are quantized as defined in the default Q-table. For the rightmost Q-table 16, only the 6 leading coefficients are quantized in the regular manner, the rest is severely quantized. The rationale behind the selection of these matrices is to investigate the importance of medium frequency information in iris recognition (high frequency information is assumed to be not useful in any case). 4 Experimental Study 4.1 Setting and Methods Iris Recognition System The employed iris recognition system is Libor Masek s Matlab implementation 1 of a 1-D version of the Daugman iris recognition algorithm. First, this algorithm segments the eye image into the iris and the remainder of the image. Iris image texture is mapped to polar coordinates resulting in a rectangular patch which is denoted polar image. After extracting the features if the iris (which are strongly quantized phase responses of complex 1-D Gabor filters in this case), considering translation, rotations and disturbed regions in the iris (a noise mask is generated), the algorithm outputs the similarity score by giving the hamming distance between two extracted templates. The range of the hamming distance reaches from zero (ideal matching of two iris images of the same person) to 0.5 (ideal mismatch between two iris images of different persons) Sample Data For all our experiments we considered 320x280 pixel images with 8-bit grayscale information per pixel from the CASIA iris image database. For rectilinear iris images, we applied the experimental calculations on the images of 100 persons using 3 images for each eye (i.e. 600 images). Note that it makes an important difference if compression is applied to rectangular or polar iris images which has an important implication on the performance of the entire system. Whereas in the case of compressing polar iris images [11] only the iris texture information is affected, in the case of compressing rectangular image data also the iris detection and determination of the noise mask is potentially affected in addition to degrading texture information. Figure 3 shows an example of a JPEG2000 compressed (compression rate 96) iris image of one person, together with the extracted iris template data and the noise masks (template and noise mask have been scaled in y-direction by a factor of 4 for proper display). The noise mask is hardly affected by the compression, whereas in the two templates differences resulting from compression artifacts are clearly observable. 1 pk/studentprojects/libor/ sourcecode.html 2

6 Custom JPEG Quantization for Improved Iris Recognition Accuracy 81 Fig. 3. Comparison of uncompressed/compressed iris image and the corresponding iris templates and noise masks Compression can be used in various stages of the matching process. Either the stored reference data may be in compressed form, or the sample data acquired for verification may be compressed (e.g. for efficient transfer), or both. Therefore, we use two settings in our experiments: either both images are compressed and matched against each other or only one image is compressed in the matching stage. For investigating correct matches (matches from legitimate users enrolled in the database), we rely on generated images (i.e. for each of the 100 persons, we have 3 images for each eye resulting in 3! possible correct matches for each eye; for 200 eyes, this totals in 1200 images per compression rate; considering the 10 different compression rates we finally result in overall images considered). This is only true in the scenario with only 1 compressed image, for 2 compressed images this number is half-ed due to symmetry reasons. For investigating matches between different persons (imposter matches), far more data is available of course. 4.2 Experimental Results Figure 4.a shows the averaged rate distortion comparison of the different compression algorithms applied to all iris images considered for three Q-tables. It is clearly displayed that employment of the default Q-table results the best PSNR across the entire range of bitrates considered. Therefore, a corresponding matching behaviour (best results for the default Q-table) could be expected in the context of iris recognition. In the following, we investigate the impact of compression on the matching score (i.e. obtained hamming distance (HD)). The interval of 0.26 HD 0.35 is discussed as the border between match and mismatch in iris recognition [2] based on recommendations for the specific technique [5] used and results shown subsequently we suggest to choose HD = 0.34 as decision criterion between match and mismatch. Fig. 4.b shows the plot of the HD after applying the iris recognition algorithm to both JPEG compressed iris images in the case of imposter matches (i.e. irises of different persons / eyes are matched against each other). The x-axis shows the compression rates, whereas the y-axis shows the averaged hamming distance. For reference, we have included the average HD for the case of uncompressed images as horizontal dotted line in light gray (labelled UC).

7 82 G.S. Kostmajer, H. Stögner, and A. Uhl (a) PSNR (b) HD (imposters) Fig. 4. Impact of varying compression rate For the case of imposters the HD remains above 0.46 across the whole range of compression rates for all sensible compression rates. This means that JPEG compression does not introduce any false positive matches on average no matter how severe compression is applied. Of course, this does not exclude the possibility of the existence of statistical outliers of course. There are no significant differences among the different Q- tables since the fluctuations occur in a negligible range. The same behaviour is observed in case only one image is compressed (not shown). In the case of genuine users (see Fig. 5), the mean value of the HD in the uncompressed case is approximately First we consider the standard Q-table (labelled STQ). For increasing compression rate the HD stays constant at approximately until the compression rate exceeds 10 and increases subsequently. A further increase of the compression rate leads to a steady increase of HD and crosses the suggested matching threshold of 0.34 between compression rates 30 and 40. Note that the reported numbers refer to averaged HD values which implies the occurrence of a significant number of false negative matches at this compression rate. In the case of both images being compressed, HD is lower on average up to a compression rate of 20. (a) one image compressed (b) both images compressed Fig. 5. Impact of varying compression rate on HD of genuine users matches

8 Custom JPEG Quantization for Improved Iris Recognition Accuracy 83 When comparing these results to those obtained with different Q-tables, we notice that Q-tables 15 and 16 clearly improve on the results of STQ from compression rate 20 upwards where Q-table 16 does so in a more pronounced manner. For compression rate 10 all other Q-tables improve slightly on STQ and for compression rate 5, Q-tables 12 and 13 are superior to STQ in terms of average HD. In the case of two images being compressed, the observed behaviour is more significant but similar in principle. These results indicate that PSNR is indeed NOT a good predictor for matching performance with compressed iris images in terms of average Hamming distance. The claim that compression up to a rate of 16 even improves the matching scores of not compressed images [11] can be supported at least for the 2 compressed images case and the STQ, for better Q-tables this is correct even up to compression rate 20 and higher. In order to consider the hidden statistical outliers in the comparisons and to use a quantity often employed in the assessment of biometric system performance, we will focus on the receiver operating characteristic (ROC) by computing and plotting the false rejection rate (FRR) against the false acceptance rate (FAR) for different compression rates: FRR = Number of (false) negative matches Number of legitimate users matches. (1) Number of (false) positive matches FAR =. (2) Number of imposter matches Figs. 6 to 8 compare the ROC of different Q-tables for compression rates 5, 10, and 20 since it is not realistic to operate the iris recognition system at a higher compression rate. Again, the two compressed image scenario is compared to the case where only one image is compressed. For compression rate 5, our proposed Q-tables are not really able to substantially improve ROC. While for one compressed image (Fig. 6.b) only Q-table 15 improves STQ slightly (and only starting from FRR > 0.08), significant improvements are seen for Q-tables 15, 16, and 13 (Fig. 6.a). However, only Q-table 15 starts improving at a reasonable low FRR> In the case of compression rate 10, the situation changes drastically. Again, Q-table 15 shows the most significant improvements. For two compressed images (Fig. 7.a), at FAR 0.028, Q-table delivers a FRR of almost 0 whereas STQ exhibits an FRR of Also the other proposed Q-tables improve on STQ in the interesting lower FRR range. In the case of only one compressed image we still find improvements, but far less pronounced (Fig. 7.b): For an FAR of 0.041, again Q-table 15 gives FRR almost 0 whereas STQ is almost at FRR 0.9. Again, also Q-tables 13 and 16 improve on STQ. Finally, when turning to compression rate 20 the situation is different (Fig. 8): now Q-table 16 shows the most significant improvements in the two compressed images case and shows behaviour similar to Q-table 15 also for one compressed image. The most noticeable improvement is found in the latter case at a FAR of where Q-table 15 exhibits FRR close to 0 and STQ has an FRR of 1.2. There is one more interesting thing to note: at least for compression rate 20 it is entirely clear that it is NOT advantageous to compress both images involved in matching

9 84 G.S. Kostmajer, H. Stögner, and A. Uhl (a) 2 compressed images (b) 1 compressed image Fig. 6. Compression rate 5 (a) 2 compressed images (b) 1 compressed image Fig. 7. Compression rate 10 (a) 2 compressed images (b) 1 compressed image Fig. 8. Compression rate 20 in terms of ROC, clearly the case of one compressed image is superior here. For compression rates 5 and 10 the better choice highly depends on the target FAR/FRR and the Q-table in use.

10 Custom JPEG Quantization for Improved Iris Recognition Accuracy 85 5 Conclusion and Future Work We have found that custom designed quantization tables in JPEG can improve matching results in terms of average HD and ROC behaviour. This is especially true for compression rates of 10 and higher where improvements are seen especially for low FAR. In this case, FRR can be limited much more effective as compared to the default quantization table. In addition to that we have found PSNR to be not at all suited to predict the recognition performance in iris recognition systems. The advantage of compressing both images involved in the matching process cannot be confirmed, in contrary, evidence for the opposite is found for higher compression rates. In future work we will consider additional alternative iris recognition algorithms in order to identify possible interference between compression technique and iris recognition system. Furthermore we will employ optimization techniques (e.g. GAs) in order to design even more customized quantization tables for this application scenario. Acknowledgements Most of the work described in this paper has been done in the scope of the ILV Compression Technologies and Data Formats (winter term 2007/2008) in the master program on Communication Engineering for IT at Carinthia Tech Institute. The artificial name Gerald Stefan Kostmajer represents the following group of students working on this project: Eigner Raimund, Fischelschweiger Erik, Gernig Stefan, Jereb Martin, Kampusch Andreas, Konrad Mario, Lenzhofer Michael, Mataln Martin, Rabl Manuel, Schlgl Daniel, and Theuermann Klaus. This work has been partially supported by the Austrian Science Fund, project no. L554-N15. References 1. Chen, M., Zhang, S., Karim, M.: Modification of standard image compression methods for correlation-based pattern recognition. Optical Engineering 43(8), (2004) 2. Daugman, J.: How iris recognition works. IEEE Transactions on Circiuts and Systems for Video Technology 14(1), (2004) 3. Daugman, J., Downing, C.: Effect of severe image compression on iris recognition performance. IEEE Transactions on Information Forensics and Security 3(1), (2008) 4. Fong, W., Chan, S., Ho, K.: Designing JPEG quantization matrix using rate-distortion approachand human visual system model. In: Proceedings of the IEEE International Conference on Communications (ICC 1997), vol. 3, pp (1997) 5. Ives, R., Bonney, B., Etter, D.: Effect of image compression on iris recognition. In: IMTC 2005 Instrumentation and Measurement Technology Conference (2005) 6. Ives, R.W., Broussard, R.P., Kennell, L.R., Soldan, D.L.: Effects of image compression on iris recognition system performance. Journal of Electronic Imaging 17, 011, 015 (2008), doi: / Jenisch, S., Lukesch, S., Uhl, A.: Comparison of compression algorithms impact on iris recognition accuracy II: revisiting JPEG. In: Proceedings of SPIE, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, vol. 6819, p M ff, San Jose, CA, USA (2008)

11 86 G.S. Kostmajer, H. Stögner, and A. Uhl 8. Jeong, G.M., Kim, C., Ahn, H.S., Ahn, B.J.: JPEG quantization table design for face images and its application to face recognition. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science E69-A(11), (2006) 9. Matschitsch, S., Tschinder, M., Uhl, A.: Comparison of compression algorithms impact on iris recognition accuracy. In: Lee, S.-W., Li, S.Z. (eds.) ICB LNCS, vol. 4642, pp Springer, Heidelberg (2007) 10. Pennebaker, W., Mitchell, J.: JPEG Still image compression standard. Van Nostrand Reinhold, New York (1993) 11. Rakshit, S., Monro, D.: Effects of sampling and compression on human iris verification. In: Proceedings of the IEEE International Conference on Acustics, Speech, and Signal Processing (ICASSP 2006), Tolouse, France, pp. II 337 II 340 (2006) 12. von Seelen, U.: IrisCode template compression and its effects on authentication performance. In: Biometrics Consortium Conference 2003 (2003)

Comparison of Compression Algorithms Impact on Iris Recognition Accuracy

Comparison of Compression Algorithms Impact on Iris Recognition Accuracy Comparison of Compression Algorithms Impact on Iris Recognition Accuracy Stefan Matschitsch 1, Martin Tschinder 1, and Andreas Uhl 1,2 1 School of Telematics & Network Engineering, Carinthia Tech Institute,

More information

Effects of JPEG XR Compression Settings on Iris Recognition Systems

Effects of JPEG XR Compression Settings on Iris Recognition Systems Effects of JPEG XR Compression Settings on Iris Recognition Systems Kurt Horvath 1, Herbert Stögner 1, and Andreas Uhl 1,2 1 School of CEIT, Carinthia University of Applied Sciences, Austria 2 Department

More information

Optimisation of JPEG XR Quantisation Settings in Iris Recognition Systems

Optimisation of JPEG XR Quantisation Settings in Iris Recognition Systems Optimisation of JPEG XR Quantisation Settings in Iris Recognition Systems Kurt Horvath and Herbert Stögner School of Communication Engineering for IT Carinthia University of Applied Sciences Klagenfurt,

More information

Semi-Fragile Watermarking in Biometric Systems: Template Self-Embedding

Semi-Fragile Watermarking in Biometric Systems: Template Self-Embedding Semi-Fragile Watermarking in Biometric Systems: Template Self-Embedding Reinhard Huber 1, Herbert Stögner 1, and Andreas Uhl 1,2 1 School of CEIT, Carinthia University of Applied Sciences, Austria 2 Department

More information

Computationally Efficient Serial Combination of Rotation-invariant and Rotation Compensating Iris Recognition Algorithms

Computationally Efficient Serial Combination of Rotation-invariant and Rotation Compensating Iris Recognition Algorithms Computationally Efficient Serial Combination of Rotation-invariant and Rotation Compensating Iris Recognition Algorithms Andreas Uhl Department of Computer Sciences University of Salzburg, Austria uhl@cosy.sbg.ac.at

More information

Comparison of Compression Algorithms Impact on Fingerprint and Face Recognition Accuracy

Comparison of Compression Algorithms Impact on Fingerprint and Face Recognition Accuracy January 31, 2007 Comparison of Compression Algorithms Impact on Fingerprint and Face Recognition Accuracy Severin Kampl, Austria Visual Communications and Image Processing 2007, San Jose Convention Center,

More information

COMPUTATIONALLY EFFICIENT SERIAL COMBINATION OF ROTATION-INVARIANT AND ROTATION COMPENSATING IRIS RECOGNITION ALGORITHMS

COMPUTATIONALLY EFFICIENT SERIAL COMBINATION OF ROTATION-INVARIANT AND ROTATION COMPENSATING IRIS RECOGNITION ALGORITHMS COMPUTATIONALLY EFFICIENT SERIAL COMBINATION OF ROTATION-INVARIANT AND ROTATION COMPENSATING IRIS RECOGNITION ALGORITHMS Mario Konrad, Herbert Stögner School of Communication Engineering for IT, Carinthia

More information

Experimental Study on Lossless Compression of Biometric Iris Data

Experimental Study on Lossless Compression of Biometric Iris Data Experimental Study on Lossless Compression of Biometric Iris Data Kurt Horvath, Herbert Stögner, Andreas Uhl, Georg Weinhandel Presenter: Rade Kutil Department of Computer Sciences University of Salzburg,

More information

Shifting Score Fusion: On Exploiting Shifting Variation in Iris Recognition

Shifting Score Fusion: On Exploiting Shifting Variation in Iris Recognition Preprocessing c 211 ACM This is the author s version of the work It is posted here by permission of ACM for your personal use Not for redistribution The definitive version was published in: C Rathgeb,

More information

An Efficient Iris Recognition Using Correlation Method

An Efficient Iris Recognition Using Correlation Method , pp. 31-40 An Efficient Iris Recognition Using Correlation Method S.S. Kulkarni 1, G.H. Pandey 2, A.S.Pethkar 3, V.K. Soni 4, &P.Rathod 5 Department of Electronics and Telecommunication Engineering, Thakur

More information

Technical Report. Cross-Sensor Comparison: LG4000-to-LG2200

Technical Report. Cross-Sensor Comparison: LG4000-to-LG2200 Technical Report Cross-Sensor Comparison: LG4000-to-LG2200 Professors: PhD. Nicolaie Popescu-Bodorin, PhD. Lucian Grigore, PhD. Valentina Balas Students: MSc. Cristina M. Noaica, BSc. Ionut Axenie, BSc

More information

IRIS Recognition System Based On DCT - Matrix Coefficient Lokesh Sharma 1

IRIS Recognition System Based On DCT - Matrix Coefficient Lokesh Sharma 1 Volume 2, Issue 10, October 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

Enhanced Iris Recognition System an Integrated Approach to Person Identification

Enhanced Iris Recognition System an Integrated Approach to Person Identification Enhanced Iris Recognition an Integrated Approach to Person Identification Gaganpreet Kaur Research Scholar, GNDEC, Ludhiana. Akshay Girdhar Associate Professor, GNDEC. Ludhiana. Manvjeet Kaur Lecturer,

More information

Efficient Iris Sample Data Protection using Selective JPEG2000 Encryption of Normalised Texture

Efficient Iris Sample Data Protection using Selective JPEG2000 Encryption of Normalised Texture c IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution

More information

A Fast and Accurate Eyelids and Eyelashes Detection Approach for Iris Segmentation

A Fast and Accurate Eyelids and Eyelashes Detection Approach for Iris Segmentation A Fast and Accurate Eyelids and Eyelashes Detection Approach for Iris Segmentation Walid Aydi, Lotfi Kamoun, Nouri Masmoudi Department of Electrical National Engineering School of Sfax Sfax University

More information

Iris Recognition for Eyelash Detection Using Gabor Filter

Iris Recognition for Eyelash Detection Using Gabor Filter Iris Recognition for Eyelash Detection Using Gabor Filter Rupesh Mude 1, Meenakshi R Patel 2 Computer Science and Engineering Rungta College of Engineering and Technology, Bhilai Abstract :- Iris recognition

More information

Critique: Efficient Iris Recognition by Characterizing Key Local Variations

Critique: Efficient Iris Recognition by Characterizing Key Local Variations Critique: Efficient Iris Recognition by Characterizing Key Local Variations Authors: L. Ma, T. Tan, Y. Wang, D. Zhang Published: IEEE Transactions on Image Processing, Vol. 13, No. 6 Critique By: Christopher

More information

Statistical Modeling of Huffman Tables Coding

Statistical Modeling of Huffman Tables Coding Statistical Modeling of Huffman Tables Coding S. Battiato 1, C. Bosco 1, A. Bruna 2, G. Di Blasi 1, and G.Gallo 1 1 D.M.I. University of Catania - Viale A. Doria 6, 95125, Catania, Italy {battiato, bosco,

More information

Algorithms for Recognition of Low Quality Iris Images. Li Peng Xie University of Ottawa

Algorithms for Recognition of Low Quality Iris Images. Li Peng Xie University of Ottawa Algorithms for Recognition of Low Quality Iris Images Li Peng Xie University of Ottawa Overview Iris Recognition Eyelash detection Accurate circular localization Covariance feature with LDA Fourier magnitude

More information

Comparing Binary Iris Biometric Templates based on Counting Bloom Filters

Comparing Binary Iris Biometric Templates based on Counting Bloom Filters Christian Rathgeb, Christoph Busch, Comparing Binary Iris Biometric Templates based on Counting Bloom Filters, In Proceedings of the 18th Iberoamerican Congress on Pattern Recognition (CIARP 13), LNCS

More information

Spatial Frequency Domain Methods for Face and Iris Recognition

Spatial Frequency Domain Methods for Face and Iris Recognition Spatial Frequency Domain Methods for Face and Iris Recognition Dept. of Electrical and Computer Engineering Carnegie Mellon University Pittsburgh, PA 15213 e-mail: Kumar@ece.cmu.edu Tel.: (412) 268-3026

More information

Graph Matching Iris Image Blocks with Local Binary Pattern

Graph Matching Iris Image Blocks with Local Binary Pattern Graph Matching Iris Image Blocs with Local Binary Pattern Zhenan Sun, Tieniu Tan, and Xianchao Qiu Center for Biometrics and Security Research, National Laboratory of Pattern Recognition, Institute of

More information

Incremental Iris Recognition: A Single-algorithm Serial Fusion Strategy to Optimize Time Complexity

Incremental Iris Recognition: A Single-algorithm Serial Fusion Strategy to Optimize Time Complexity C Rathgeb, A Uhl, and P Wild Iris Recognition: A Single-algorithm Serial Fusion Strategy to Optimize Time Complexity In Proceedings of the IEEE 4th International Conference on Biometrics: Theory, Applications,

More information

A Video Watermarking Algorithm Based on the Human Visual System Properties

A Video Watermarking Algorithm Based on the Human Visual System Properties A Video Watermarking Algorithm Based on the Human Visual System Properties Ji-Young Moon 1 and Yo-Sung Ho 2 1 Samsung Electronics Co., LTD 416, Maetan3-dong, Paldal-gu, Suwon-si, Gyenggi-do, Korea jiyoung.moon@samsung.com

More information

DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION. Ani1 K. Jain and Nicolae Duta

DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION. Ani1 K. Jain and Nicolae Duta DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION Ani1 K. Jain and Nicolae Duta Department of Computer Science and Engineering Michigan State University, East Lansing, MI 48824-1026, USA E-mail:

More information

A biometric iris recognition system based on principal components analysis, genetic algorithms and cosine-distance

A biometric iris recognition system based on principal components analysis, genetic algorithms and cosine-distance Safety and Security Engineering VI 203 A biometric iris recognition system based on principal components analysis, genetic algorithms and cosine-distance V. Nosso 1, F. Garzia 1,2 & R. Cusani 1 1 Department

More information

A New Encoding of Iris Images Employing Eight Quantization Levels

A New Encoding of Iris Images Employing Eight Quantization Levels A New Encoding of Iris Images Employing Eight Quantization Levels Oktay Koçand Arban Uka Computer Engineering Department, Epoka University, Tirana, Albania Email: {okoc12, auka}@epoka.edu.al different

More information

Interactive Progressive Encoding System For Transmission of Complex Images

Interactive Progressive Encoding System For Transmission of Complex Images Interactive Progressive Encoding System For Transmission of Complex Images Borko Furht 1, Yingli Wang 1, and Joe Celli 2 1 NSF Multimedia Laboratory Florida Atlantic University, Boca Raton, Florida 33431

More information

Feature-level Fusion for Effective Palmprint Authentication

Feature-level Fusion for Effective Palmprint Authentication Feature-level Fusion for Effective Palmprint Authentication Adams Wai-Kin Kong 1, 2 and David Zhang 1 1 Biometric Research Center, Department of Computing The Hong Kong Polytechnic University, Kowloon,

More information

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM 109 CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM Security is considered to be the most critical factor in many applications. The main issues of such

More information

Video Compression An Introduction

Video Compression An Introduction Video Compression An Introduction The increasing demand to incorporate video data into telecommunications services, the corporate environment, the entertainment industry, and even at home has made digital

More information

A reversible data hiding based on adaptive prediction technique and histogram shifting

A reversible data hiding based on adaptive prediction technique and histogram shifting A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn

More information

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Digital Image Steganography Techniques: Case Study. Karnataka, India. ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College

More information

VC 12/13 T16 Video Compression

VC 12/13 T16 Video Compression VC 12/13 T16 Video Compression Mestrado em Ciência de Computadores Mestrado Integrado em Engenharia de Redes e Sistemas Informáticos Miguel Tavares Coimbra Outline The need for compression Types of redundancy

More information

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition Hiren D. Joshi Phd, Dept. of Computer Science Rollwala Computer Centre

More information

CMPT 365 Multimedia Systems. Media Compression - Image

CMPT 365 Multimedia Systems. Media Compression - Image CMPT 365 Multimedia Systems Media Compression - Image Spring 2017 Edited from slides by Dr. Jiangchuan Liu CMPT365 Multimedia Systems 1 Facts about JPEG JPEG - Joint Photographic Experts Group International

More information

A Very Low Bit Rate Image Compressor Using Transformed Classified Vector Quantization

A Very Low Bit Rate Image Compressor Using Transformed Classified Vector Quantization Informatica 29 (2005) 335 341 335 A Very Low Bit Rate Image Compressor Using Transformed Classified Vector Quantization Hsien-Wen Tseng Department of Information Management Chaoyang University of Technology

More information

Quality of biometric data: definition and validation of metrics. Christophe Charrier GREYC - Caen, France

Quality of biometric data: definition and validation of metrics. Christophe Charrier GREYC - Caen, France Quality of biometric data: definition and validation of metrics Christophe Charrier GREYC - Caen, France 1 GREYC Research Lab Le pôle TES et le sans-contact Caen 2 3 Introduction Introduction Quality of

More information

IRIS SEGMENTATION OF NON-IDEAL IMAGES

IRIS SEGMENTATION OF NON-IDEAL IMAGES IRIS SEGMENTATION OF NON-IDEAL IMAGES William S. Weld St. Lawrence University Computer Science Department Canton, NY 13617 Xiaojun Qi, Ph.D Utah State University Computer Science Department Logan, UT 84322

More information

Online Signature Verification Technique

Online Signature Verification Technique Volume 3, Issue 1 ISSN: 2320-5288 International Journal of Engineering Technology & Management Research Journal homepage: www.ijetmr.org Online Signature Verification Technique Ankit Soni M Tech Student,

More information

A New Approach to Compressed Image Steganography Using Wavelet Transform

A New Approach to Compressed Image Steganography Using Wavelet Transform IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography

More information

DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION

DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION Ghulam Muhammad*,1, Muhammad Hussain 2, Anwar M. Mirza 1, and George Bebis 3 1 Department of Computer Engineering, 2 Department of

More information

Implementation and analysis of Directional DCT in H.264

Implementation and analysis of Directional DCT in H.264 Implementation and analysis of Directional DCT in H.264 EE 5359 Multimedia Processing Guidance: Dr K R Rao Priyadarshini Anjanappa UTA ID: 1000730236 priyadarshini.anjanappa@mavs.uta.edu Introduction A

More information

Compression of RADARSAT Data with Block Adaptive Wavelets Abstract: 1. Introduction

Compression of RADARSAT Data with Block Adaptive Wavelets Abstract: 1. Introduction Compression of RADARSAT Data with Block Adaptive Wavelets Ian Cumming and Jing Wang Department of Electrical and Computer Engineering The University of British Columbia 2356 Main Mall, Vancouver, BC, Canada

More information

A Minimum Number of Features with Full-Accuracy Iris Recognition

A Minimum Number of Features with Full-Accuracy Iris Recognition Vol. 6, No. 3, 205 A Minimum Number of Features with Full-Accuracy Iris Recognition Ibrahim E. Ziedan Dept. of computers and systems Faculty of Engineering Zagazig University Zagazig, Egypt Mira Magdy

More information

An introduction on several biometric modalities. Yuning Xu

An introduction on several biometric modalities. Yuning Xu An introduction on several biometric modalities Yuning Xu The way human beings use to recognize each other: equip machines with that capability Passwords can be forgotten, tokens can be lost Post-9/11

More information

IRIS recognition II. Eduard Bakštein,

IRIS recognition II. Eduard Bakštein, IRIS recognition II. Eduard Bakštein, edurard.bakstein@fel.cvut.cz 22.10.2013 acknowledgement: Andrzej Drygajlo, EPFL Switzerland Iris recognition process Input: image of the eye Iris Segmentation Projection

More information

Intra-Mode Indexed Nonuniform Quantization Parameter Matrices in AVC/H.264

Intra-Mode Indexed Nonuniform Quantization Parameter Matrices in AVC/H.264 Intra-Mode Indexed Nonuniform Quantization Parameter Matrices in AVC/H.264 Jing Hu and Jerry D. Gibson Department of Electrical and Computer Engineering University of California, Santa Barbara, California

More information

Mesh Based Interpolative Coding (MBIC)

Mesh Based Interpolative Coding (MBIC) Mesh Based Interpolative Coding (MBIC) Eckhart Baum, Joachim Speidel Institut für Nachrichtenübertragung, University of Stuttgart An alternative method to H.6 encoding of moving images at bit rates below

More information

AUDIOVISUAL COMMUNICATION

AUDIOVISUAL COMMUNICATION AUDIOVISUAL COMMUNICATION Laboratory Session: Discrete Cosine Transform Fernando Pereira The objective of this lab session about the Discrete Cosine Transform (DCT) is to get the students familiar with

More information

(Refer Slide Time 00:17) Welcome to the course on Digital Image Processing. (Refer Slide Time 00:22)

(Refer Slide Time 00:17) Welcome to the course on Digital Image Processing. (Refer Slide Time 00:22) Digital Image Processing Prof. P. K. Biswas Department of Electronics and Electrical Communications Engineering Indian Institute of Technology, Kharagpur Module Number 01 Lecture Number 02 Application

More information

Data Hiding in Video

Data Hiding in Video Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract

More information

Online and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison

Online and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison Online and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison Biagio Freni, Gian Luca Marcialis, and Fabio Roli University of Cagliari Department of Electrical and Electronic

More information

A Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm

A Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm International Journal of Engineering Research and General Science Volume 3, Issue 4, July-August, 15 ISSN 91-2730 A Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm

More information

EE 5359 MULTIMEDIA PROCESSING SPRING Final Report IMPLEMENTATION AND ANALYSIS OF DIRECTIONAL DISCRETE COSINE TRANSFORM IN H.

EE 5359 MULTIMEDIA PROCESSING SPRING Final Report IMPLEMENTATION AND ANALYSIS OF DIRECTIONAL DISCRETE COSINE TRANSFORM IN H. EE 5359 MULTIMEDIA PROCESSING SPRING 2011 Final Report IMPLEMENTATION AND ANALYSIS OF DIRECTIONAL DISCRETE COSINE TRANSFORM IN H.264 Under guidance of DR K R RAO DEPARTMENT OF ELECTRICAL ENGINEERING UNIVERSITY

More information

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2009, Article ID 187874, 11 pages doi:10.1155/2009/187874 Research Article Improvements in Geometry-Based Secret Image Sharing

More information

JPEG Copy Paste Forgery Detection Using BAG Optimized for Complex Images

JPEG Copy Paste Forgery Detection Using BAG Optimized for Complex Images JPEG Copy Paste Forgery Detection Using BAG Optimized for Complex Images Dessalegn Atnafu AYALNEH*, Hyoung Joong KIM*, Yong Soo CHOI** *CIST (Center for Information Security Technologies), Korea University

More information

Reducing FMR of Fingerprint Verification by Using the Partial Band of Similarity

Reducing FMR of Fingerprint Verification by Using the Partial Band of Similarity Reducing FMR of Fingerprint Verification by Using the Partial Band of Similarity Seung-Hoon Chae 1,Chang-Ho Seo 2, Yongwha Chung 3, and Sung Bum Pan 4,* 1 Dept. of Information and Communication Engineering,

More information

Feature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic Handwriting

Feature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic Handwriting Feature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic Handwriting Karl Kümmel, Tobias Scheidat, Christian Arndt and Claus Vielhauer Brandenburg University of Applied

More information

Dilation Aware Multi-Image Enrollment for Iris Biometrics

Dilation Aware Multi-Image Enrollment for Iris Biometrics Dilation Aware Multi-Image Enrollment for Iris Biometrics Estefan Ortiz 1 and Kevin W. Bowyer 1 1 Abstract Current iris biometric systems enroll a person based on the best eye image taken at the time of

More information

Compression of Stereo Images using a Huffman-Zip Scheme

Compression of Stereo Images using a Huffman-Zip Scheme Compression of Stereo Images using a Huffman-Zip Scheme John Hamann, Vickey Yeh Department of Electrical Engineering, Stanford University Stanford, CA 94304 jhamann@stanford.edu, vickey@stanford.edu Abstract

More information

Lossless Image Compression having Compression Ratio Higher than JPEG

Lossless Image Compression having Compression Ratio Higher than JPEG Cloud Computing & Big Data 35 Lossless Image Compression having Compression Ratio Higher than JPEG Madan Singh madan.phdce@gmail.com, Vishal Chaudhary Computer Science and Engineering, Jaipur National

More information

Improving Personal Identification Accuracy Using Multisensor Fusion for Building Access Control Applications

Improving Personal Identification Accuracy Using Multisensor Fusion for Building Access Control Applications Improving Personal Identification Accuracy Using Multisensor Fusion for Building Access Control Applications Lisa Osadciw, Pramod Varshney, and Kalyan Veeramachaneni laosadci,varshney,kveerama@syr.edu

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Fingerprint Recognition using Robust Local Features Madhuri and

More information

Locating 1-D Bar Codes in DCT-Domain

Locating 1-D Bar Codes in DCT-Domain Edith Cowan University Research Online ECU Publications Pre. 2011 2006 Locating 1-D Bar Codes in DCT-Domain Alexander Tropf Edith Cowan University Douglas Chai Edith Cowan University 10.1109/ICASSP.2006.1660449

More information

Image Compression: An Artificial Neural Network Approach

Image Compression: An Artificial Neural Network Approach Image Compression: An Artificial Neural Network Approach Anjana B 1, Mrs Shreeja R 2 1 Department of Computer Science and Engineering, Calicut University, Kuttippuram 2 Department of Computer Science and

More information

Overcompressing JPEG images with Evolution Algorithms

Overcompressing JPEG images with Evolution Algorithms Author manuscript, published in "EvoIASP2007, Valencia : Spain (2007)" Overcompressing JPEG images with Evolution Algorithms Jacques Lévy Véhel 1, Franklin Mendivil 2 and Evelyne Lutton 1 1 Inria, Complex

More information

Network-based model for video packet importance considering both compression artifacts and packet losses

Network-based model for video packet importance considering both compression artifacts and packet losses Network-based model for video packet importance considering both compression artifacts and packet losses Yuxia Wang Communication University of China Beijing, China, 124 Email: yuxiaw@cuc.edu.cn Ting-Lan

More information

Block-based Watermarking Using Random Position Key

Block-based Watermarking Using Random Position Key IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.2, February 2009 83 Block-based Watermarking Using Random Position Key Won-Jei Kim, Jong-Keuk Lee, Ji-Hong Kim, and Ki-Ryong

More information

Block Mean Value Based Image Perceptual Hashing for Content Identification

Block Mean Value Based Image Perceptual Hashing for Content Identification Block Mean Value Based Image Perceptual Hashing for Content Identification Abstract. Image perceptual hashing has been proposed to identify or authenticate image contents in a robust way against distortions

More information

Adaptive Quantization for Video Compression in Frequency Domain

Adaptive Quantization for Video Compression in Frequency Domain Adaptive Quantization for Video Compression in Frequency Domain *Aree A. Mohammed and **Alan A. Abdulla * Computer Science Department ** Mathematic Department University of Sulaimani P.O.Box: 334 Sulaimani

More information

Partial Face Matching between Near Infrared and Visual Images in MBGC Portal Challenge

Partial Face Matching between Near Infrared and Visual Images in MBGC Portal Challenge Partial Face Matching between Near Infrared and Visual Images in MBGC Portal Challenge Dong Yi, Shengcai Liao, Zhen Lei, Jitao Sang, and Stan Z. Li Center for Biometrics and Security Research, Institute

More information

Compressive Sensing for Multimedia. Communications in Wireless Sensor Networks

Compressive Sensing for Multimedia. Communications in Wireless Sensor Networks Compressive Sensing for Multimedia 1 Communications in Wireless Sensor Networks Wael Barakat & Rabih Saliba MDDSP Project Final Report Prof. Brian L. Evans May 9, 2008 Abstract Compressive Sensing is an

More information

MRT based Fixed Block size Transform Coding

MRT based Fixed Block size Transform Coding 3 MRT based Fixed Block size Transform Coding Contents 3.1 Transform Coding..64 3.1.1 Transform Selection...65 3.1.2 Sub-image size selection... 66 3.1.3 Bit Allocation.....67 3.2 Transform coding using

More information

Fast Mode Decision for H.264/AVC Using Mode Prediction

Fast Mode Decision for H.264/AVC Using Mode Prediction Fast Mode Decision for H.264/AVC Using Mode Prediction Song-Hak Ri and Joern Ostermann Institut fuer Informationsverarbeitung, Appelstr 9A, D-30167 Hannover, Germany ri@tnt.uni-hannover.de ostermann@tnt.uni-hannover.de

More information

The Impact of Diffuse Illumination on Iris Recognition

The Impact of Diffuse Illumination on Iris Recognition The Impact of Diffuse Illumination on Iris Recognition Amanda Sgroi, Kevin W. Bowyer, and Patrick J. Flynn University of Notre Dame asgroi kwb flynn @nd.edu Abstract Iris illumination typically causes

More information

Biometric Data Hiding: A 3 Factor Authentication Approach to Verify Identity with a Single Image Using Steganography, Encryption and Matching

Biometric Data Hiding: A 3 Factor Authentication Approach to Verify Identity with a Single Image Using Steganography, Encryption and Matching Biometric Data Hiding: A 3 Factor Authentication Approach to Verify Identity with a Single Image Using Steganography, Encryption and Matching Neha Agrawal and Marios Savvides Carnegie Mellon University

More information

CHAPTER-4 WATERMARKING OF GRAY IMAGES

CHAPTER-4 WATERMARKING OF GRAY IMAGES CHAPTER-4 WATERMARKING OF GRAY IMAGES 4.1 INTRODUCTION Like most DCT based watermarking schemes, Middle-Band Coefficient Exchange scheme has proven its robustness against those attacks, which anyhow, do

More information

Efficient Iris Identification with Improved Segmentation Techniques

Efficient Iris Identification with Improved Segmentation Techniques Efficient Iris Identification with Improved Segmentation Techniques Abhishek Verma and Chengjun Liu Department of Computer Science New Jersey Institute of Technology Newark, NJ 07102, USA {av56, chengjun.liu}@njit.edu

More information

International Journal of Advance Engineering and Research Development. Iris Recognition and Automated Eye Tracking

International Journal of Advance Engineering and Research Development. Iris Recognition and Automated Eye Tracking International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 4.72 Special Issue SIEICON-2017,April -2017 e-issn : 2348-4470 p-issn : 2348-6406 Iris

More information

A combined fractal and wavelet image compression approach

A combined fractal and wavelet image compression approach A combined fractal and wavelet image compression approach 1 Bhagyashree Y Chaudhari, 2 ShubhanginiUgale 1 Student, 2 Assistant Professor Electronics and Communication Department, G. H. Raisoni Academy

More information

Efficient Image Compression of Medical Images Using the Wavelet Transform and Fuzzy c-means Clustering on Regions of Interest.

Efficient Image Compression of Medical Images Using the Wavelet Transform and Fuzzy c-means Clustering on Regions of Interest. Efficient Image Compression of Medical Images Using the Wavelet Transform and Fuzzy c-means Clustering on Regions of Interest. D.A. Karras, S.A. Karkanis and D. E. Maroulis University of Piraeus, Dept.

More information

Iris Recognition System with Accurate Eyelash Segmentation & Improved FAR, FRR using Textural & Topological Features

Iris Recognition System with Accurate Eyelash Segmentation & Improved FAR, FRR using Textural & Topological Features Iris Recognition System with Accurate Eyelash Segmentation & Improved FAR, FRR using Textural & Topological Features Archana V Mire Asst Prof dept of IT,Bapurao Deshmukh College of Engineering, Sevagram

More information

Outline Introduction MPEG-2 MPEG-4. Video Compression. Introduction to MPEG. Prof. Pratikgiri Goswami

Outline Introduction MPEG-2 MPEG-4. Video Compression. Introduction to MPEG. Prof. Pratikgiri Goswami to MPEG Prof. Pratikgiri Goswami Electronics & Communication Department, Shree Swami Atmanand Saraswati Institute of Technology, Surat. Outline of Topics 1 2 Coding 3 Video Object Representation Outline

More information

INTERPRETING FINGERPRINT AUTHENTICATION PERFORMANCE TECHNICAL WHITE PAPER

INTERPRETING FINGERPRINT AUTHENTICATION PERFORMANCE TECHNICAL WHITE PAPER INTERPRETING FINGERPRINT AUTHENTICATION PERFORMANCE TECHNICAL WHITE PAPER Fidelica Microsystems, Inc. 423 Dixon Landing Rd. Milpitas, CA 95035 1 INTRODUCTION The fingerprint-imaging segment of the biometrics

More information

Video Inter-frame Forgery Identification Based on Optical Flow Consistency

Video Inter-frame Forgery Identification Based on Optical Flow Consistency Sensors & Transducers 24 by IFSA Publishing, S. L. http://www.sensorsportal.com Video Inter-frame Forgery Identification Based on Optical Flow Consistency Qi Wang, Zhaohong Li, Zhenzhen Zhang, Qinglong

More information

Features. Sequential encoding. Progressive encoding. Hierarchical encoding. Lossless encoding using a different strategy

Features. Sequential encoding. Progressive encoding. Hierarchical encoding. Lossless encoding using a different strategy JPEG JPEG Joint Photographic Expert Group Voted as international standard in 1992 Works with color and grayscale images, e.g., satellite, medical,... Motivation: The compression ratio of lossless methods

More information

Tutorial 8. Jun Xu, Teaching Asistant March 30, COMP4134 Biometrics Authentication

Tutorial 8. Jun Xu, Teaching Asistant March 30, COMP4134 Biometrics Authentication Tutorial 8 Jun Xu, Teaching Asistant csjunxu@comp.polyu.edu.hk COMP4134 Biometrics Authentication March 30, 2017 Table of Contents Problems Problem 1: Answer The Questions Problem 2: Daugman s Method Problem

More information

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions Edith Cowan University Research Online ECU Publications Pre. JPEG compression of monochrome D-barcode images using DCT coefficient distributions Keng Teong Tan Hong Kong Baptist University Douglas Chai

More information

Biometric Security Roles & Resources

Biometric Security Roles & Resources Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures

More information

Bit-Plane Decomposition Steganography Using Wavelet Compressed Video

Bit-Plane Decomposition Steganography Using Wavelet Compressed Video Bit-Plane Decomposition Steganography Using Wavelet Compressed Video Tomonori Furuta, Hideki Noda, Michiharu Niimi, Eiji Kawaguchi Kyushu Institute of Technology, Dept. of Electrical, Electronic and Computer

More information

Spatial Enhancement Definition

Spatial Enhancement Definition Spatial Enhancement Nickolas Faust The Electro- Optics, Environment, and Materials Laboratory Georgia Tech Research Institute Georgia Institute of Technology Definition Spectral enhancement relies on changing

More information

A new predictive image compression scheme using histogram analysis and pattern matching

A new predictive image compression scheme using histogram analysis and pattern matching University of Wollongong Research Online University of Wollongong in Dubai - Papers University of Wollongong in Dubai 00 A new predictive image compression scheme using histogram analysis and pattern matching

More information

Polar Harmonic Transform for Fingerprint Recognition

Polar Harmonic Transform for Fingerprint Recognition International Journal Of Engineering Research And Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 13, Issue 11 (November 2017), PP.50-55 Polar Harmonic Transform for Fingerprint

More information

Image Segmentation Techniques for Object-Based Coding

Image Segmentation Techniques for Object-Based Coding Image Techniques for Object-Based Coding Junaid Ahmed, Joseph Bosworth, and Scott T. Acton The Oklahoma Imaging Laboratory School of Electrical and Computer Engineering Oklahoma State University {ajunaid,bosworj,sacton}@okstate.edu

More information

A Robust Video Hash Scheme Based on. 2D-DCT Temporal Maximum Occurrence

A Robust Video Hash Scheme Based on. 2D-DCT Temporal Maximum Occurrence A Robust Video Hash Scheme Based on 1 2D-DCT Temporal Maximum Occurrence Qian Chen, Jun Tian, and Dapeng Wu Abstract In this paper, we propose a video hash scheme that utilizes image hash and spatio-temporal

More information

APPM 2360 Project 2 Due Nov. 3 at 5:00 PM in D2L

APPM 2360 Project 2 Due Nov. 3 at 5:00 PM in D2L APPM 2360 Project 2 Due Nov. 3 at 5:00 PM in D2L 1 Introduction Digital images are stored as matrices of pixels. For color images, the matrix contains an ordered triple giving the RGB color values at each

More information

CHAPTER 5 PALMPRINT RECOGNITION WITH ENHANCEMENT

CHAPTER 5 PALMPRINT RECOGNITION WITH ENHANCEMENT 145 CHAPTER 5 PALMPRINT RECOGNITION WITH ENHANCEMENT 5.1 INTRODUCTION This chapter discusses the application of enhancement technique in palmprint recognition system. Section 5.2 describes image sharpening

More information

Biometric Security System Using Palm print

Biometric Security System Using Palm print ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3 Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander

More information